2024
Cascade 2D attentional decoders with context-enhanced encoder for scene text recognition.
Neural Comput. Appl., May, 2024
Securing Against Deception: Exploring Phishing Emails Through ChatGPT and Sentiment Analysis.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering Research, 2024
Advancing Forensic Examination of Cyber Predator Communication Through Machine Learning.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Deciphering Livestream Contents: OCR-Driven Thumbnail Forensic Analysis.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Enhancing 3D Printing Infill Quality through Advanced Machine Learning.
Proceedings of the 16th International Conference on Electronics, 2024
Gemini's Multimodal Prowess: Robust Detection of Adversarial Patch Attacks through Text and Image Inputs.
Proceedings of the 2024 ACM Southeast Conference, 2024
2023
SDAA: Secure Data Aggregation and Authentication Using Multiple Sinks in Cluster-Based Underwater Vehicular Wireless Sensor Network.
Sensors, 2023
Collaborative and Active Learning with Portable Online Hands-on Labware for Blockchain Development.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023
BERT-Based Sentiment Forensics Analysis for Intrusion Detection.
Proceedings of the International Conference on Machine Learning and Applications, 2023
A Framework to Reconstruct Digital Forensics Evidence via Goal-Oriented Modeling.
Proceedings of the IEEE 2nd International Conference on AI in Cybersecurity, 2023
Forensic Analysis of Contents in Thumbnails Using Transfer Learning.
Proceedings of the Future Technologies Conference, 2023
AI-Assisted Security: A Step towards Reimagining Software Development for a Safer Future.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Crime Scene Prediction for Unmanned Aerial Vehicles Investigation via Machine Learning.
Proceedings of the 8th International Conference on Automation, 2023
Enhancing Object Detection in YouTube Thumbnails Forensics with YOLOv4.
Proceedings of the IEEE International Conference on Big Data, 2023
Forecasting COVID-19 Hotspots in Florida Public Schools: A Machine Learning Approach.
Proceedings of the IEEE International Conference on Big Data, 2023
Secure Software Development in Google Colab.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023
Quantum Machine Learning for Security Data Analysis.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023
2022
Comparison of Deepfake Detection Techniques through Deep Learning.
J. Cybersecur. Priv., March, 2022
Digital Evidence Acquisition and Deepfake Detection with Decentralized Applications.
Proceedings of the PEARC '22: Practice and Experience in Advanced Research Computing, Boston, MA, USA, July 10, 2022
Targeted Data Extraction and Deepfake Detection with Blockchain Technology.
Proceedings of the 6th International Conference on Universal Village, 2022
Integrating Blockchain Technology into Cybersecurity Education.
Proceedings of the Future Technologies Conference, 2022
Investigating Gender and Racial Bias in ELECTRA.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022
Unmanned Aerial Vehicle Forensics Investigation Performance under Different Attacks.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022
Proof of Non-stationary Channel Polarization.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022
2021
A Low-Cost Multi-Failure Resilient Replication Scheme for High-Data Availability in Cloud Storage.
IEEE/ACM Trans. Netw., 2021
Regulations and Standards Aware Framework for Recording of mHealth App Vulnerabilities.
Int. J. E Health Medical Commun., 2021
A Personalized Learning Framework for Software Vulnerability Detection and Education.
Proceedings of the 2021 International Symposium on Computer Science and Intelligent Control, 2021
Inherent Discriminability of BERT Towards Racial Minority Associated Data.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
CDetector: Extracting Textual Features of Financial Social Media to Detect Cyber Attacks.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Applying Machine Learning to Analyze Anti-Vaccination on Tweets.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
DECADE - Deep Learning Based Content-hiding Application Detection System for Android.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
Embedded conformal deep low-rank auto-encoder network for matrix recovery.
Pattern Recognit. Lett., 2020
Competitive and collaborative representation for classification.
Pattern Recognit. Lett., 2020
Secure polar coding with delayed wiretapping information.
IET Commun., 2020
Secure Polar Coding for Adversarial Wiretap Channel.
CoRR, 2020
"Is your Smart Home a Secure Home?" - Analysis of Smart Home Breaches and an Approach for Vulnerability Analysis and Device Isolation.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020
DeepDive: Examining Determinants of Health Disparities in COVID-19 for Improving Pandemic Health Care.
Proceedings of the ICVISP 2020: 4th International Conference on Vision, 2020
Integrating Blockchain Technology in Healthcare via Active Learning.
Proceedings of the 2020 ACM Southeast Conference, 2020
2019
Encrypted secure polar coding scheme for general two-way wiretap channel.
IET Inf. Secur., 2019
An augmented self-adaptive parameter control in evolutionary computation: A case study for the berth scheduling problem.
Adv. Eng. Informatics, 2019
Data Protection Labware for Mobile Security.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
A Forensic Evidence Acquisition Model for Data Leakage Attacks.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
A Targeted Data Extraction System for Mobile Devices.
,
,
,
,
,
,
,
,
,
,
Proceedings of the Advances in Digital Forensics XV, 2019
Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
STPSA 2019 Welcome Message.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
2018
Supervised neighborhood regularized collaborative representation for face recognition.
Multim. Tools Appl., 2018
Strong Security Polar Coding with Delayed Wiretap Channel State Information.
CoRR, 2018
Computational Investigations of Optimal Scrambled Halton Sequences.
Proceedings of the Practice and Experience on Advanced Research Computing, 2018
Investigation of Florida Housing Prices using Predictive Time Series Model.
Proceedings of the Practice and Experience on Advanced Research Computing, 2018
A Framework for IoT Data Acquisition and Forensics Analysis.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
A framework for validating aimed mobile digital forensics evidences.
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018, 2018
Design of cybersecurity hands-on laboratory exercises using secDLC framework.
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018, 2018
2017
Predict Florida Tourism Trend via Using Data Mining Techniques.
Proceedings of the Practice and Experience in Advanced Research Computing 2017: Sustainability, 2017
A Quick Outlier Detection in Wireless Body Area Networks.
Proceedings of the Practice and Experience in Advanced Research Computing 2017: Sustainability, 2017
Developing serious games to promote cognitive abilities for the elderly.
Proceedings of the 5th IEEE International Conference on Serious Games and Applications for Health, 2017
A Case Study for Mobile Device Forensics Tools.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017
Implement Hands-on Labs for File Integrity via Open Sources.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017
2016
Survey of Security Challenges in NFC and RFID for E-Health Applications.
Int. J. E Health Medical Commun., 2016
Integrating Computing to STEM Curriculum via CodeBoard.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016
Particle Swarm Optimization Simulation via Optimal Halton Sequences.
Proceedings of the International Conference on Computational Science 2016, 2016
2015
An online game simulation environment for detecting potential deceptive insiders.
Proceedings of the 2015 Winter Simulation Conference, 2015
An investigation of privacy protocols in location-based service.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
Integrate mobile devices into CS security education.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
A Fast Approach Towards Android Malware Detection.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015
2014
Quasi-Monte Carlo method in population genetics parameter estimation.
Math. Comput. Simul., 2014
Design insider threat hands-on labs.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014
Securing EHRs via CPMA attribute-based encryption on cloud systems.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
A framework for teaching secure coding practices to STEM students with mobile devices.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
2013
Generation of parallel modified Kronecker sequences.
Monte Carlo Methods Appl., 2013
Teaching Secure Coding Practices to STEM Students.
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013
GPU-Based Simulation of Wireless Body Area Network.
Proceedings of the 8th International Conference on Body Area Networks, 2013
An empirical study of botnets on university networks using low-interaction honeypots.
Proceedings of the ACM Southeast Regional Conference 2013, 2013
2012
Enhancing Mentoring Between Alumni and Students via Smart Alumni System.
Proceedings of the International Conference on Computational Science, 2012
GPU-based simulation of wireless body sensor networks.
Proceedings of the Winter Simulation Conference, 2012
Designing and implementing cloud-based digital forensics hands-on labs.
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012
A framework for designing an environment science social network.
Proceedings of the 50th Annual Southeast Regional Conference, 2012
2011
Teaching Computing to STEM Students via Visualization Tools.
Proceedings of the International Conference on Computational Science, 2011
Poster: Quasi-Monte Carlo method in population genetics parameter estimation.
Proceedings of the IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences, 2011
A framework for designing benchmarks of investigating digital forensics tools for mobile devices.
Proceedings of the 49th Annual Southeast Regional Conference, 2011
Enhancing cryptography education via visualization tools.
Proceedings of the 49th Annual Southeast Regional Conference, 2011
Cyber threat analysis for university networks via virtual honeypots.
Proceedings of the 49th Annual Southeast Regional Conference, 2011
2010
Computational investigations of scrambled Faure sequences.
Math. Comput. Simul., 2010
Designing a computer forensics concentration for cross-disciplinary undergraduate students.
Proceedings of the Information Security Curriculum Development Conference, 2010
Active learning approaches to teaching information assurance.
Proceedings of the Information Security Curriculum Development Conference, 2010
Generating Parallel Random Sequences via Parameterizing EICGs for Heterogeneous Computing Environments.
Proceedings of the Computational Science and Its Applications, 2010
Broadening Information Assurance Awareness by Gaming.
Proceedings of the 2010 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2010
A Framework for Smart Trusted Indicators for Browsers (STIB).
Proceedings of the 2010 International Conference on Security & Management, 2010
A framework for access control model in enterprise healthcare via SAML.
Proceedings of the 48th Annual Southeast Regional Conference, 2010
2009
Parallel quasirandom number generations for heterogeneous computing environments.
Int. J. Parallel Emergent Distributed Syst., 2009
Rare Event Simulation Via Randomized Quasi-Monte Carlo (abstract).
Proceedings of the Huntsville Simulation Conference, 2009
Framework for the design of web-based learning for digital forensics labs.
Proceedings of the 47th Annual Southeast Regional Conference, 2009
2008
Exploitation of sensitivity derivatives via randomized quasi-Monte Carlo methods.
Monte Carlo Methods Appl., 2008
Implementation of a Security Access Control Model for Inter-organizational Healthcare Information Systems.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
Generating parallel quasirandom sequences via randomization.
J. Parallel Distributed Comput., 2007
A conceptual model to support the integration of inter-organizational healthcare information systems.
Proceedings of the Winter Simulation Conference, 2007
Effectively generating random test data via cellular automata.
Proceedings of the Winter Simulation Conference, 2007
Efficient Generation of Parallel Quasirandom Faure Sequences Via Scrambling.
Proceedings of the Computational Science, 2007
2006
Computational investigations of quasirandom sequences in generating test cases for specification-based tests.
Proceedings of the Winter Simulation Conference WSC 2006, 2006
Quasi-random Walks on Balls Using C.U.D. Sequences.
Proceedings of the Numerical Methods and Applications, 6th International Conference, 2006
Generating Test Data for Specification-Based Tests Via Quasirandom Sequences.
Proceedings of the Computational Science, 2006
2005
On the optimal Halton sequence.
Math. Comput. Simul., 2005
Assesssing uncertainty in software reliability via quasi-monte carlo methods.
Proceedings of the 37th Winter Simulation Conference, Orlando, FL, USA, December 4-7, 2005, 2005
Parallel Random Generators for Heterogeneous Computing Environments.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005
On the Scrambled Sobol Sequence.
Proceedings of the Computational Science, 2005
2004
Parallel linear congruential generators with Sophie-Germain moduli.
Parallel Comput., 2004
On the Scrambled Halton Sequence.
Monte Carlo Methods Appl., 2004